In 2016, we published more than 50 blog posts about authentication, fraud trends, data breaches, new attacks, fraud prevention best practices and more. We also developed more content based on our research team’s findings to better protect against fraud. We are committed
The threat landscape continues to be ever changing and complicated, and 2017 will be no different. Some attacks that we saw emerge in 2016 will escalate, while new and dynamic fraud attacks will also emerge. As organizations try to stay one step ahead of today’s sophisticated cybercriminals, we will
Online shopping sales alone this holiday season are expected to hit $117 billion and that spells big profits for retailers and big opportunity for those who aren’t concerned with receiving a lump of coal in their stocking.
Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction.
Fraudsters are getting ever more creative. Every app and device is now an avenue for new threats seeking to capture the personal information of end users. Not long ago, we wrote about Remote Access Threats (RAT), which aim to access users’ cameras and microphones.
This post is part of our continuing series of exploring and integrating new probabilistic tools for fraud prevention. Read the first and second installments. The most common way to mitigate phishing attacks is by warning end users that they have navigated to a phishing website, for which the browser must
Fraudsters and cybercriminals react to the introduction of new security solutions by moving to a different part of the value chain or by changing and updating their attack methods.This is why it is important to have a holistic strategy
As many of you may have seen, last Friday we announced that private equity firms BC Partners and our investor Medina Capital have entered into a definitive agreement to acquire Easy Solutions. The deal is part of a joint venture to create a global secure infrastructure platform and includes
We’ve all heard the phrase “the best defense is a good offense.” The analogy proves as true on the football field as it does in the field of online fraud prevention. Too many instances exist where companies rush to implement
One of the newest techniques to detect anomalies is called Isolation Forests. The algorithm is based on the fact that anomalies are data points that are few and different. As a result of these properties, anomalies are susceptible to a mechanism